The present disclosure relates to composite devices, and more particularly to composite devices comprising a human-readable target device and a verification device in machine-readable (or non-human-readable) encoding. The disclosure also relates to apparatus and processes of utilizing composite devices, such as processes and apparatus for verifying authenticity of a target object, for automated network destination access, and/or for verifying accuracy of optical character recognition systems.
The human culture is substantially founded on human readable symbols such as alphanumerical characters, non-alphanumerical characters, Latin or non-Latin characters, Asian characters, Greek, Arabic or Egyptian symbols, in ASCII, Unicode or otherwise, or a combination thereof.
With the growing in social complexity, human readable symbols are often arranged in strings for everyday applications. For example, passport or personal identification information, addresses, names, vehicle registration numbers, and website addresses are in strings of human readable symbols. A string of human readable symbols in this disclosure in interchangeably used with the term “token” where the context permits.
With the increasing sophistication of image process technologies, human readable symbols or strings thereof are often processed by automated means for subsequent utilization. For example, passports are scanned and personal data such as names, date of birth, nationality, passport number are automatically extracted by image processing technologies such as optical character recognition (“OCR”) techniques. The extracted data may be subsequently utilized for various purposes such as statistics, security checking, personal tracking, or immigration control.
While known image processing techniques are very sophisticated, there are rooms for improvement. For example, OCR are not particularly accurate in differentiating similar or highly similar symbols such as between the alphabet “o” and the numeral “0”, between the alphabet “I” and the number “1”, and between the capital alphabet “I” and the lower case alphabet “i”.
It would be beneficial if means are provided to enhance OCR operations on such tokens to make their applications more reliable and/or to expand their scope of applications.
The present disclosure will be described by way of examples with reference to the accompanying Figures, in which: —
There is disclosed a composite device comprising a human-readable target device and a verification device in machine-readable (or non-human-readable) encoding in which the verification device is related to the target device by a predefined scheme of operation.
The target device may comprise a plurality of human readable symbols. For example, the human readable symbols may be arranged into a string of symbols which is also referred to as a ‘token’ herein.
The human readable symbols may be alphanumerical characters, non-alphanumerical characters, Latin or non-Latin characters, Asian characters, Greek, Arabic or Egyptian symbols, in ASCII, Unicode or otherwise, or a combination thereof.
The content of the verification device may be different to that of the target device. For example, the verification device may comprise human readable symbols of a different content, patterns, shapes, outlines, a characteristic frequency or characteristic frequency components embedded in a pattern, any other symbols suitable to facilitate machine extraction and verification, and a combination thereof.
The content of the verification device may relate to the target device by a predetermined scheme of operation. The predetermined scheme of operation may be a mathematical or non-mathematical function, a look-up table, or any predetermined relationship.
For example, the verification device may relate to the target device by a hash function to generate a check code such as hash value, a checksum function to generate a check code such as a checksum, and/or a check digit function to generate a check code such as a check digit.
The target token may be arranged into a string of human readable symbols and the encoded verification device is adjacent to or (partly) overlapping with the target token.
The verification device may be encoded in a digital format, and may be encoded to beyond human extraction or recognition.
There is also disclosed an apparatus comprising a processor and an image acquisition device, wherein the apparatus is to acquire an image of a target object, to process the image of the target object to extract a human readable target device by optical recognition and to extract a verification device which is embedded in non-human readable encoding, to verify the target device with respect to the extracted verification device, and to utilize the extracted target device when verification is satisfactory.
The apparatus is to process the target device according to the scheme of operation and to compare result of the scheme of operation with the verification device to facilitate verification.
The apparatus may process the plurality of human readable symbols of the target device to generate a lesser plurality of symbols according to the scheme of operation to facilitate verification by comparison with the verification device.
Where the predetermined scheme of operation is a mathematical or non-mathematical function, a look-up table, or any predetermined relationship, the processor is to process the target device with the function, table or relationship to obtain a result to facilitate verification.
The apparatus may include a user input interface to facilitate user interactive input of data, and the processor is to prompt a user to input data corresponding to the target device or the encoded verification device as shown through a display media such as a built-in display or an external display.
Where the initial verification with respect to an initial image is not satisfactory, the apparatus is to re-view another image of the target object, to process and extract a target device by optical recognition and to extract a verification device by processor decoding from that another image, and to verify a newly extracted target device with respect to a newly extracted verification device.
In an example, the apparatus comprises a telecommunications frontend to facilitate communication with a network and the target device contains address information of a network destination, and the apparatus is to access external network destination utilizing the target device upon successful verification.
In an example, the apparatus comprises an image viewing device for viewing an image of a target object.
In an example, the apparatus is an authentication apparatus and the processor is to verify authenticity of an object with reference to outcome of verification of the target device with respect to the verification device and with reference to a predetermined scheme of operation.
There is disclosed a process of utilizing a composite device disclosed herein, wherein the process comprises processing an image of the target object to extract a human readable target device by optical recognition and to extract a verification device which is embedded in non-human readable encoding, comparing the extracted target device with respect to the extracted verification device, and utilizing the outcome of comparison.
The process may include using the outcome of comparison to determine authenticity of the object.
Where the target device comprises address information of a network destination that is sufficient to facilitate the network apparatus to access said network destination, and the process may include automatically directing a network apparatus to access the network destination upon a satisfactory outcome of comparison. The network apparatus may be a desktop computer, a notebook computer, a tablet computer, a smart phone, or a dedicated network communication apparatus.
The process may include accepting a user interactive input and requesting a user to input the address information upon a failed outcome of comparison.
The process may include using the outcome of comparison to determine accuracy of an optical character recognition process or an optical character recognition apparatus.
The process may include repeating the steps upon a failed outcome of comparison to mitigate user instability during image viewing affecting accuracy.
The process may be in the form of application software for installing onto a computing device, such as a mobile computing device having a built-in image acquisition device and display.
An example composite device 100 depicted in
The example encoded verification device 120 is an analogue coded representation of the digit ‘7’ which is related to the string “12345” by a function. The function is a check-code generation function in this example. This example check-code function as an example of a predetermined scheme of operation is to generate a check code using the string of numerals of the encoded verification device 120 by assigning an ASCII value to each numeral, summing the assigned ASCII values, and to obtain a modulus-8 value by dividing the sum by 8. The check code obtained will be used to compare with a check value embedded in the encoded verification device to be explained. In this example, the numerals 1, 2, 3, 4, and 5 have respectively the ASCII values 49, 50, 51, 52 and 53 and the total sum of the assigned ASCII values is 255 which gives a modulus-8 value of 7. An example process to generate a check code using this example check code generating function is depicted in
An example composite device 200 depicted in
In this example, a modulus-8 check-code function is also used for illustration and a maximum of 3 solid black dots is needed to represent the value of the verification code in the binary format. Therefore, the encoded verification device includes a maximum total of 4 solid black dots, including a leftmost reference dot and a maximum of 3 solid black dots to the right side of the reference dot. Four positions underneath the target device are reserved for the 4 solid black dots and the four reserved positions are at the same separation for convenient identification. A representation showing a correlation between the arrangement of the solid dots and the associated value is depicted in
An example composite device 300 depicted in
An example composite device 400 depicted in
For example, the check code for the token “12345” according to the relationship function is 7 and this is represented by presence of all the three patterns p1, p2 & p3 in the background. When the check code value is 2, this is represented by presence of p2 and absence of p1 & p3 in the background. When the check code value is 0, none of p1, p2 & p3 is present in the background.
In an example process to determine presence or absence of these patterns, an image of the background is processed by Fast Fourier Transform to obtain frequency domain data and then to extract the characteristic alignment directions to determine the presence or absence of p1, p2, p3.
While alignment directions have been used as the encoding data in this example, the encoding scheme can make use of frequency variation and/or variation of Fourier coefficient magnitude.
Furthermore, watermark techniques such as least significant bit watermarking, discrete cosine transform watermarking, discrete wavelet transform watermarking, Fourier-Mellin transform watermarking, Patchwork watermarking, or a combination thereof, may also be used for producing a machine readable code that carries a check code without loss of generality
Another example relation function to generate a check code from a string of human readable alphanumerical characters of a target device is by way of a hash function as depicted in
While a check code of alphanumerical characters has been used as an example, it should be appreciated that the check code may not be human readable or may not have a human readable counterpart. For example, the check code may be a specific pattern, such as a pattern having predefined pattern elements distributed in a predefined spacing and/or predefined orientation, a specific shape, or a shape having a characteristic outline to correspond with a specific target device. In another example, the check code may be a pattern having a characteristic spatial frequency or characteristic spatial frequency components to correspond with a specific target device. The correspondence between a target device and a check code may be defined by relations such as by a look-up table.
An example process to recover a composite device from an article will be described by way of example with reference to
In an example process 600 as depicted in
An example technique to extract the encoded verification device of this example from an image of the target object is to utilize characteristic intensity level distributions of pixels forming the image. As depicted in
In an example process as depicted in
In another example application, the composite device may be used as a network access device to direct a network apparatus to access a network destination.
In an example application process, a processor is to capture an image of the business card 540, to process the captured image to extract the components of the composite device 500 for utilization. For example, the processor may extract the first target device 510a, the first encoded verification device 520a, the second target device 510b and the second encoded verification device 520b in a single step. Alternatively, the processor may extract the first group of data comprising the first target device 510a and the first encoded verification device 520a when the first target device is to be utilized, or to extract the second group of data comprising the second target device 510b and the second encoded verification device 520b when the second target device is to be utilized. The first target device after processing by the scheme of operation is to compare with the first encoded verification device and the second target device after processing by the scheme of operation is to compare with the second encoded verification device in the manner described above without loss of generality. Upon successful verification, the first target device may be used to make telephone contact while the second target device may be used to make internet access as examples. In this example, the first target device is a telephone number given by the person, namely “John Smith”, which is unique to the person; hence, the number can be used as an index for the details of the person and customized options, provided that the first encoded verification device is generated and printed on the card as shown. The second target device can be given by a device provider. The second target device is unique and serves as an index to company information and customized options, provided that the second encoded verification device is generated and printed on the card as shown. The device provider may (randomly) generate a pair of target device and encoded verification device for any user. The device provider may do so on a computer server or by having users to install a device generator application on a computing device.
While the example processes have been described with reference to the composite device 200, it should be appreciated that the processes are applicable to other composite devices without loss of generality.
In an example operation of the apparatus as depicted in
In another example, the apparatus 800 is to operate as an authentication apparatus (or authentication apparatus in short) by having installed an authentication application software, or by accessing the application on a remote computer server. The application software is to device a window and a cursor to be shown on the display 808 to guide a user. In this example, a CD (compact disc) 740 depicted in
In use, when the application software is executed, an image of the CD 740 will be captured by the authentication apparatus and shown on the display 808 as depicted in
While various devices, processes, applications and apparatus have been described herein, it should be appreciated that they are examples to facilitate understanding and should not be used to restrict the scope of disclosure. For example, while the encoded verifications devices are illustrated with visible signs or patterns which are machine readable, it should be appreciated that the encoded verification devices need not be visible. For example, the machine readable codes can be invisible codes such as invisible patterns, magnetic data, radio-frequency data or optical data.
Number | Date | Country | Kind |
---|---|---|---|
12105995.0 | Jun 2012 | HK | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2013/055022 | 6/19/2013 | WO | 00 |